Claude Code Skills & Agents Framework
This repository provides Claude Code skills, specialized agents, and slash commands for security testing workflows.
```mermaid
graph TB
subgraph "User Interface"
A[Security Researcher
Penetration Tester
Bug Bounty Hunter]
end
subgraph "Claude Code IDE"
B[Slash Commands
/pentest /hackerone /commit]
end
subgraph "Skills Layer .claude/skills/"
C1[Pentest Skill]
C2[HackerOne Skill]
C3[CVE Testing]
C4[Domain Assessment]
C5[Web App Mapping]
C6[Common AppSec]
C7[Authenticating]
end
subgraph "Orchestration Agents .claude/agents/"
D1[Pentester Agent
Multi-phase coordinator]
D2[HackerOne Hunter
Bug bounty workflow]
D3[Git Workflow Agents
Issue/PR/Branch]
D4[Skiller Agent
Skill creation]
end
subgraph "Specialized Agents .claude/agents/specialized/"
E1[SQL Injection]
E2[XSS Testing]
E3[SSRF Detection]
E4[JWT Attack]
E5[OAuth Testing]
E6[SSTI Detection]
E7[XXE Testing]
E8[35+ More Agents]
end
subgraph "Tools & Automation"
F1[Playwright MCP
Browser automation]
F2[HTTP Testing
curl/httpx/requests]
F3[Evidence Capture
Screenshots/Videos]
end
subgraph "Standardized Outputs .claude/output-standards/"
G1[Reconnaissance
inventory/ + analysis/]
G2[Vulnerability Testing
findings/ + evidence/]
G3[Bug Bounty
Platform submissions]
end
A --> B
B --> C1 & C2 & C3 & C4 & C5 & C6 & C7
C1 --> D1
C2 --> D2
C3 & C4 & C5 & C6 --> D1
D1 & D2 --> E1 & E2 & E3 & E4 & E5 & E6 & E7 & E8
E1 & E2 & E3 & E4 & E5 & E6 & E7 & E8 --> F1 & F2 & F3
F1 & F2 & F3 --> G1 & G2 & G3
style B fill:#4CAF50,color:#fff
style D1 fill:#2196F3,color:#fff
style G2 fill:#9C27B0,color:#fff
```
Repository Structure
```
communitytools/
βββ .claude/
β βββ skills/ # Security testing skills
β β βββ pentest/ # 46+ attack types, 264+ lab walkthroughs
β β βββ hackerone/ # Bug bounty hunting automation
β β βββ cve-testing/ # CVE vulnerability testing
β β βββ domain-assessment/ # Subdomain discovery, port scanning
β β βββ web-application-mapping/ # Endpoint discovery, tech detection
β β βββ common-appsec-patterns/ # OWASP Top 10 testing
β β βββ authenticating/ # Auth testing, 2FA bypass, bot evasion
β β
β βββ agents/ # Orchestration agents
β β βββ pentester.md # Multi-phase pentest coordinator
β β βββ hackerone-hunter.md # Bug bounty workflow orchestrator
β β βββ skiller.md # Skill creation/management
β β βββ git-*.md # Git workflow automation
β β βββ specialized/ # 35+ vulnerability-specific agents
β β βββ sql-injection-agent.md
β β βββ xss-agent.md
β β βββ ssrf-agent.md
β β βββ jwt-agent.md
β β βββ ... (31 more)
β β
β βββ commands/ # Slash commands
β β βββ pentest.md # /pentest command
β β βββ hackerone.md # /hackerone command
β β βββ commit.md # /commit workflow
β β βββ ... (11 total)
β β
β βββ output-standards/ # Standardized output formats
β βββ OUTPUT_STANDARDS.md
β βββ reference/
β
βββ outputs/ # Generated findings and reports
βββ CLAUDE.md # Repository-wide instructions
βββ CONTRIBUTING.md # Contribution guidelines
βββ README.md # This file
```
Multi-Agent Execution Flow
```mermaid
sequenceDiagram
participant User
participant Skill as Pentest Skill
participant Orch as Pentester Agent
participant Agents as Specialized Agents
participant Tools as Playwright/HTTP
participant Output as Standardized Outputs
User->>Skill: /pentest https://target.com
Skill->>Orch: Initialize 7-phase workflow
Orch->>Agents: Phase 1-2: Deploy recon agents
Agents->>Tools: Domain assessment, port scanning
Tools-->>Output: inventory/.json + analysis/.md
Orch->>Agents: Phase 3-4: Deploy 35+ vuln agents in parallel
Agents->>Tools: SQL/XSS/SSRF/JWT/OAuth testing
Tools-->>Output: findings/.json + evidence/.png
Orch->>Output: Phase 5: Generate reports
Output-->>User: Executive + technical reports
Note over Agents,Tools: Specialized agents:
SQL, NoSQL, XSS, SSRF,
JWT, OAuth, SSTI, XXE,
+ 27 more types
```
---